Sciweavers

2403 search results - page 92 / 481
» Cyberinsurance in IT Security Management
Sort
View
ISSA
2004
13 years 11 months ago
A Comparative Study Of Standards And Practices Related To Information Security Management
The need for Information Security in organisations, regardless of their type and size, is being addressed by emerging standards and recommended best practices. The various standar...
Evangelos D. Frangopoulos
STORAGESS
2005
ACM
14 years 4 months ago
Pvault: a client server system providing mobile access to personal data
In this paper we describe the design for the Pvault software, which is a personal data manager that stores and retrieves data from a remote untrusted data server securely. The maj...
Ravi Chandra Jammalamadaka, Sharad Mehrotra, Nalin...
DISCEX
2003
IEEE
14 years 3 months ago
The STRONGMAN Architecture
The design principle of restricting local autonomy only where necessary for global robustness has led to a scalable Internet. Unfortunately, this scalability and capacity for dist...
Angelos D. Keromytis, Sotiris Ioannidis, Michael B...
XMLSEC
2003
ACM
14 years 3 months ago
First experiences using XACML for access control in distributed systems
Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as com...
Markus Lorch, Seth Proctor, Rebekah Lepro, Dennis ...
AISM
2004
13 years 11 months ago
Developing a framework for understanding Security Governance
With reported security incidents in organisations on the increase, effective Security Governance is expected to become a major issue in organisations. A research framework of Secu...
C. C. Terence Tan